Challenges and Opportunities in Collaborative Vulnerability Research Workflows

作者: Nathan Schurr , Ryan Mullins , Ben Nargi , Mike Keeney , Deirdre Kelliher

DOI: 10.1177/1071181320641094

关键词:

摘要: Recently, cyber reasoning systems demonstrated near-human performance characteristics when they autonomously identified, proved, and mitigated vulnerabilities in software during a competitive event...

参考文章(20)
Andrés Lucero, Using Affinity Diagrams to Evaluate Interactive Prototypes international conference on human-computer interaction. pp. 231- 248 ,(2015) , 10.1007/978-3-319-22668-2_19
Andy Ozment, Improving vulnerability discovery models Proceedings of the 2007 ACM workshop on Quality of protection - QoP '07. pp. 6- 11 ,(2007) , 10.1145/1314257.1314261
Hille C. Bruns, Working Alone Together: Coordination in Collaboration across Domains of Expertise Academy of Management Journal. ,vol. 56, pp. 62- 83 ,(2013) , 10.5465/AMJ.2010.0756
Hossain Shahriar, Mohammad Zulkernine, Mitigating program security vulnerabilities: Approaches and challenges ACM Computing Surveys. ,vol. 44, pp. 11- ,(2012) , 10.1145/2187671.2187673
Nancy J Cooke, None, Varieties of knowledge elicitation techniques International Journal of Human-computer Studies \/ International Journal of Man-machine Studies. ,vol. 41, pp. 801- 849 ,(1994) , 10.1006/IJHC.1994.1083
Bingchang Liu, Liang Shi, Zhuhua Cai, Min Li, Software Vulnerability Discovery Techniques: A Survey international conference on multimedia information networking and security. pp. 152- 156 ,(2012) , 10.1109/MINES.2012.202
Sabah Al-Fedaghi, System-based Approach to Software Vulnerability international conference on social computing. pp. 1072- 1079 ,(2010) , 10.1109/SOCIALCOM.2010.159
Raghu Raman, Sherin Sunny, Vipin Pavithran, Krishnasree Achuthan, Framework for evaluating Capture the Flag (CTF) security competitions international conference for convergence for technology. pp. 1- 5 ,(2014) , 10.1109/I2CT.2014.7092098
James C. King, Symbolic execution and program testing Communications of The ACM. ,vol. 19, pp. 385- 394 ,(1976) , 10.1145/360248.360252